Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,878 results for "Internet Law & Strategy"...

Asset Protection: Adequately Copyrighting Your Web Site
January 03, 2006
An often-overlooked component of a company's intellectual property portfolio is the company Web site. This is especially true in the fast-paced world of technology firms, whose primary emphasis is usually core technology in the form of patents or trade secrets. The Web site, as a matter of course, is the most innocuous of assets, but it's an asset nonetheless.
Business Crimes Hotline
January 03, 2006
National rulings of interest to you and your practice.
Secondary, Extraterritorial Liability for Process Inventions
December 05, 2005
The reach of U.S. influence on the world is undeniable, and the Federal Circuit in the past few months has done nothing to shrink from that expansion.
Infringement By Source Code 'Golden Master': Developments in Patent Infringement Law Concerning Extra-U.S. Sales
December 05, 2005
Until recently, U.S. software companies comfortably operated under the assumption that selling software that was copied from a "golden master" CD outside of the United States, and which was sold only to customers outside of the United States, did not infringe U.S. patents. Recent developments in the law have destroyed that comfort and made clear that infringement liability may very well lie for exactly those types of foreign sales.
Negotiating Alignment, Not Agreement: A Guide to Effective Tenant Negotiations
December 02, 2005
What do negotiators fear most? Failure, being manipulated and being second-guessed. Why do negotiators fail and why are they manipulated or second-guessed? Often, it's lack of adequate preparation and disregard for the issues, purposes and concerns of the other side. A lack of internal alignment can lead to confusion and that dreaded second-guessing. A well-prepared negotiator can be manipulation proof, avoid the second-guessing and achieve valuable results.
The Best of MLF 2005: Looking Back at the 'Benchmark' Year
November 30, 2005
Well, it's been an exciting year here at <i>Marketing the Law Firm</i>. As with past practice, this month's issue will be a look back at the year that was. In this issue we will present February (the January issue recaps part of 2004) through July.
<b>Practice Tip:</b> Find Wireless Nirvana in a 3G Network
November 30, 2005
The term "3G" proclaims the next revolution in wireless technology. It refers to the much-ballyhooed third generation cellular network services, currently available in the United States from Verizon, Sprint and Cingular. But after all the hype, is 3G living up to its broadband promise?
Merging Firms, Merging Information
November 30, 2005
For many firms there are significant advantages to increased scale. Broader geographical coverage and increased expertise enable firms to provide a more complete offering to their large clients, who operate in an increasingly global world. Given the sometimes difficult task of opening new offices and the competition amongst firms for partners, many firms choose to grow through merging.
Employee Blogging: What Employers Don't Know Could Hurt Them
November 30, 2005
Technology offers employers significant advantages, but it can be a double-edged sword. Technology has created issues that employers have never dealt with before ' and bases for liability employers have never confronted before.
Hate v. Free Speech
November 30, 2005
What can lawyers do about vile words in a country where freedom of speech is the first order of business according to the Bill of Rights?

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›